VS Code extensions with 125M+ installs expose users to cyberattacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读文章内容,理解主要信息。 文章标题提到四个VS Code扩展被曝出存在漏洞,影响超过1.25亿用户。接着,文章详细说明了这些扩展的名字、漏洞的CVE编号、CVSS评分以及下载量。OX Security的研究人员发现这些漏洞可能导致文件窃取和远程代码执行。 接下来,我需要提取关键点:四个扩展、下载量大、漏洞类型(文件窃取和远程代码执行)、研究人员的警告以及对开发者的影响。同时,文章还提到维护者没有及时回应漏洞报告,这可能反映出系统性问题。 现在,我需要将这些信息浓缩到100字以内。要确保涵盖主要扩展、下载量、漏洞带来的风险以及研究人员的建议。同时,语言要简洁明了,直接描述内容。 最后,检查字数是否符合要求,并确保没有使用“这篇文章”或“内容总结”这样的开头。 </think> 四个广泛使用的 VS Code 扩展(Live Server、Code Runner、Markdown Preview Enhanced 和 Microsoft Live Preview)存在严重漏洞,总计被下载超 1.25 亿次。攻击者可借此窃取文件并远程执行代码。OX Security 研究人员警告称这些漏洞对全球开发者构成重大威胁,并建议用户仅安装可信扩展以降低风险。 2026-2-18 15:14:33 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

VS Code extensions with 125M+ installs expose users to cyberattacks

Pierluigi Paganini February 18, 2026

Four popular VS Code extensions with 125M+ installs have flaws that could let hackers steal files and run code remotely.

OX Security researchers warn that security flaws in four widely used VS Code extensions (Live Server, Code Runner, Markdown Preview Enhanced, and Microsoft Live Preview) could allow attackers to steal local files and execute code remotely. These extensions have been installed over 125 million times, putting many users at risk.

“The OX Security Research team found vulnerabilities in four popular VS Code extensions (later confirmed on Cursor and Windsurf). Three were assigned CVEs – CVE-2025-65715, CVE-2025-65716, and CVE-2025-65717 – totaling over 120 million downloads and posing a significant threat to developers worldwide.” reads the report published by OX Security. “Our research demonstrates that a hacker needs only one malicious extension, or a single vulnerability within one extension, to perform lateral movement and compromise entire organizations.

Below are the flaws discovered by the researchers:

CVE IDExtension NameCVSS ScoreDownloadsVulnerabilityAffected VersionsLink
CVE-2025-65717Live Server9.172M+Remote file exfiltrationAll versionsMarketplace
CVE-2025-65715Code Runner7.837M+Remote code executionAll versionsMarketplace
CVE-2025-65716Markdown Preview Enhanced8.88.5M+JavaScript code execution leading to local port scanning with potential data exfiltrationAll versionsMarketplace
No CVE issuedMicrosoft Live Preview11M+One-Click XSS to full IDE files exfiltrationFixed in v0.4.16+ (no CVE issued, no proper credit)

IDE extensions act like mini-admins with broad access to users’ systems. If users install poorly designed or malicious extensions, attackers can run code, modify files, and take over their machines. Opening a project or clicking a file can let attackers move laterally, steal data, and gain full control, putting sensitive information at high risk.

Researchers disclosed three vulnerabilities in July–August 2025 but received no response from the maintainers, despite reaching out via email, GitHub, and social media. Months of disclosure attempts went unanswered, highlighting a systemic issue: extension security lacks accountability and incentives for timely fixes.

The experts remark that current “install at your own risk” model is no longer safe. Solutions include mandatory security reviews before publishing, AI-powered vulnerability scanning, and enforceable maintainer response rules. As AI coding assistants speed development and reliance on extensions grows, securing developer tools must start at the source.

The experts recommend users should avoid opening untrusted HTML while localhost servers run and avoid running unnecessary servers. They should never paste or run unverified snippets in global settings.json. Users must install only trusted extensions, monitor or back up settings.json, disable or remove non-essential extensions, harden local networks with firewalls, and promptly apply security updates to IDEs, extensions, OS, and development dependencies.

“The vulnerabilities discovered in these widely adopted VS Code extensions – collectively downloaded over 128 million times – expose a critical blind spot in modern development security.” concludes the report. “While organizations invest heavily in securing production environments, the developer’s local machine remains a largely unprotected gateway to an organization’s most sensitive assets.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, VS Code extensions)




文章来源: https://securityaffairs.com/188185/security/vs-code-extensions-with-125m-installs-expose-users-to-cyberattacks.html
如有侵权请联系:admin#unsafe.sh